🏠 Strona Główna
Benchmarki
📊 Wszystkie benchmarki 🦖 Dinozaur v1 🦖 Dinozaur v2 ✅ Aplikacje To-Do List 🎨 Kreatywne wolne strony 🎯 FSACB - Ostateczny pokaz 🌍 Benchmark tłumaczeń
Modele
🏆 Top 10 modeli 🆓 Darmowe modele 📋 Wszystkie modele ⚙️ Kilo Code
Zasoby
💬 Biblioteka promptów 📖 Słownik AI 🔗 Przydatne linki

Słownik AI

Kompletny słownik sztucznej inteligencji

162
kategorie
2 032
podkategorie
23 060
pojęcia
📖
pojęcia

Private Set Intersection

Cryptographic protocol allowing two parties to discover the intersection of their private data sets without revealing other information. This method is particularly useful for collaboration between organizations while preserving confidentiality.

📖
pojęcia

Secure Enclaves

Hardware-level isolated and secure memory area that ensures the confidentiality and integrity of the code and data executed there. Secure enclaves protect against unauthorized access even by the operating system or hypervisor.

📖
pojęcia

k-Anonymity

Privacy protection model ensuring that each record in an anonymized dataset is indistinguishable from at least k-1 other records. This approach prevents re-identification through cross-referencing of quasi-identifiers.

📖
pojęcia

l-Diversity

Extension of the k-anonymity model ensuring that for each group of quasi-identical records, there are at least l distinct values for sensitive attributes. This measure strengthens protection against attribute inference attacks.

📖
pojęcia

t-Closeness

Privacy criterion requiring that the distribution of sensitive values in each equivalence group be close to the overall distribution in the dataset. This approach prevents distribution inference attacks in anonymized data.

📖
pojęcia

Secure Function Evaluation

Protocol allowing multiple parties to collaborate to evaluate a function on their combined private inputs without revealing these inputs individually. This technology enables collaborative analysis while preserving the confidentiality of participants' data.

📖
pojęcia

Distributed Ledger Privacy

Set of cryptographic techniques applied to distributed ledgers to ensure transaction confidentiality while maintaining transparency and auditability. These mechanisms include blind signatures, commitments, and zero-knowledge proofs.

🔍

Nie znaleziono wyników